General Discussion: Recovered Lotus Notes nsf files can not be opened
A couple of additional questions for the community: 1: Is there a way to tell whether or not Notes was set to save copies of outgoing email in the ‘Sent’ folder? And maybe if/when this setting was...
View ArticleMobile Phone Forensics: Extracting video from cell phone
Can you provide a bit more details to this? Unless you are "extracting" logical file, in this case a video file, how would you distinguish one block of data from an other without looking at it? This is...
View ArticleEmployment and Career Issues: I have been offered an interview opportunity...
Hi there, I am currently studying my masters in computer forensics and i have been offered an interview for a graduate position next week in Deloitte's IT Security and Forensics department. I am just...
View ArticleMobile Phone Forensics: Apple iPhone 4 - Recovery of deleted internet history?
jmorgan10 wrote: Secondly, I wish to parse the contents of cookies.binarycookies file into a clear and readable format, preferably into a spreadsheet with everything nicely laid out....
View ArticleGeneral Discussion: OSINT - are there any gurus in the house?
JHowell wrote: My company recently purchased the IntelTechniques OSINT training for every member. We all learned a lot (and I have been doing OSINT for many years). It takes about 40 hours to go...
View ArticleEducation and Training: Books that every Forensics Investigator should read
UNIX and Linux Forensic Analysis by Pogue, Chris, Altheide, Cory and Haverkos, Todd (Jul 24, 2008)
View ArticleGeneral Discussion: Windows Timestamps
Also, and NOT what you asked , since you made an example with a word document, do check this: http://www.forensicfocus.com/Forums/viewtopic/t=10627/ particularly corey_h's "cheatsheets":...
View ArticleEmployment and Career Issues: I have been offered an interview opportunity...
The interview process varies depending on the company. I have been through several different interviews over the past two years and have found they tend to follow a pattern: 1) A 35-45 minute face to...
View ArticleGeneral Discussion: OSINT - are there any gurus in the house?
I will try to tackle these:"If you were paying for access to Frank's website out of your own pocket, do you feel it pays for itself as far as the info it provides to you?" Just to make sure we are...
View ArticleMobile Phone Forensics: Apple iPhone 4 - Recovery of deleted internet history?
Thank you DCS and jaclaz for your tips.
View ArticleMobile Phone Forensics: using adb to extract android
jhup wrote: ADB will provide you a "bridge" (ergo the name) to access the phone content; it will not extract data. The ADB daemon or server on the phone runs when it is enabled (debug/dev mode), and is...
View ArticleMobile Phone Forensics: LogMeIn Ignition
Hello, I have encountered what I think is a time stamp in an xml file extracted from an iPhone. The stamps appears as "tstamp=01cd7f8c4382eac4". I have attempted various conversions, but so far have...
View ArticleForensic Software: Facebook Forensic Beta
Good afternoon, BETA application to assist with investigations and preservation of content on the Facebook social media platform: www.facebookforensics.com I could do with making contact with analysts...
View ArticleMobile Phone Forensics: using adb to extract android
How do you pull data from a device instance to dev. machine without knowing the file/directory names? shell requires at least one other tool on the device from /system/bin/. Those are the two other...
View ArticleEmployment and Career Issues: I have been offered an interview opportunity...
Come to think of it, from court room psychology, the fillers used make the expert witness more human, approachable, "one of us" and possibly more believable from the trier of fact's perspective. Just a...
View ArticleGeneral Discussion: Can you help me breakdown this MP4 Metadata?
DigitalAgent wrote: I want to understand as much of the data as I can, but there are some things I can't find out. ISO/IEC 14496-14:2003 is the authoritative reference for this file format, possibly...
View ArticleGeneral Discussion: Windows Timestamps
Quote:: Did you read the book File System Forensic Analysis by Brian Carrier? I think, This book contains answers to your questions. Igor_Michailov thank you for your replay. As soon as I saw your post...
View ArticleGeneral Discussion: Acquire Checkpoint FDE SSD with Encase Forensic
Hi there the 2 PIN method is a challenge response system using the checkpoint software. You would have to boot the device to enter these details. If I remember correctly this method does not actually...
View ArticleGeneral Discussion: Windows 7 MBR system unable to view Windows 8 GPT HDD
kiashi wrote: I ran fsutil command on it when it was mounted correctly and this reported 512b/sector :)Yes/No. <img src="images/smiles/icon_eek.gif" alt="Shocked" title="Shocked" /> Meaning that...
View ArticleForensic Hardware: Free stuff.
Forgive me, I thought that Radio Tactics were well known. Here is a link to explain the access cards. http://www.radio-tactics.com/products/technology-/handset-access-cards . It's essentially a single...
View Article